Search Results - diagnostic+tools+for+network+vulnerability+evaluations

6 Results Sort By:
Hardware Trojan Resilience For Implantable Biosensors Through Ai-based Biosignal Modeling
Advantages: The technology offers enhanced security by providing robust protection against potential attacks on IWMDs, ensuring patient privacy. Virtual biosensors enable real-time detection and correction of anomalies and errors, allowing for immediate corrective actions. By mitigating attacks on sensor availability and correctness, the technology...
Published: 7/13/2023   |   Inventor(s): Robert Karam, Shakil Mahmud
Keywords(s): Diagnostic Tools for Network Vulnerability Evaluations, Implantable Biosensors, Medical Devices, Sensor, Wearable Monitoring Equipment
Category(s): Technology Classifications > Medical > Medical Devices, Technology Classifications > Computer Science > C/S Sensors, Technology Classifications, Technology Classifications > Medical > Biotechnology
System and Method for Reducing a Threat Footprint of an Area-of-Interest
Advantages: The AI-enabled technology automates the risk assessment process and eliminates the need for manual techniques, which can be time-consuming and prone to human error. By leveraging AI, the technology is able to learn patterns and analyze complex data, uncovering new and previously unrecognized attack paths and strategies. The methodical...
Published: 2/6/2024   |   Inventor(s): Ankit Shah, Soumyadeep Hore, Dinesh Sharma
Keywords(s): Artificial Intelligence, Diagnostic Tools for Network Vulnerability Evaluations, Machine Learning
Category(s): Technology Classifications > Software > Multimedia, Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Computer Science > Algorithms, Technology Classifications > Computer Science > C/S Cybersecurity
CYBERSECURITY: Reliability Of A Computer Network
Competitive Advantages This analytical model is developed using real data of the National Vulnerability Database, NVD. This analytical model is made up of data from Microsoft, Linux, and Apple computer operating systems that represents 99.34% of the market around the globe. This analytical model can identify the minimum number of steps, n, that...
Published: 7/12/2023   |   Inventor(s): Chris Tsokos, Freeh Alenezi
Keywords(s): Computers Software and Information Technology, Cryptography and Intrusion Detection, Cybersecurity, Diagnostic Tools for Network Vulnerability Evaluations
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity
Wireless Efficient Privacy, Authentication and Resiliency Technologies for Forensic and Sensitive Data
Competitive Advantages Shows a near-optimal performance at the logger (e.g., resource limited IoT device). Achieves post-quantum security. FHE-based alternatives are ideal for single-server setting without a collusion-risk. Develop strategies to achieve scalable signature verification for constructions. Summary This invention creates a new...
Published: 1/12/2023   |   Inventor(s): Attila Yavuz
Keywords(s): Cryptography and Intrusion Detection, Cybersecurity, Diagnostic Tools for Network Vulnerability Evaluations, Telecommunication and Wireless Communication
Category(s): Technology Classifications > Electronics > Electronics Telecommunications, Technology Classifications > Electronics, Technology Classifications > Computer Science > C/S Cybersecurity
Deep Cyber Vulnerability Mitigator
Competitive Advantages Organization-specific context-based threat detection and mitigation. Continuous refinement of defender’s policies according to the threats identified. Assignment of security personnel according to the threat level of vulnerability and skills of the individual. Summary Cyberthreats are increasing daily with continuously...
Published: 9/12/2024   |   Inventor(s): Ankit Shah
Keywords(s): Computer Science, Cybersecurity, Diagnostic Tools for Network Vulnerability Evaluations
Category(s): Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Computer Science > Algorithms
Data Anomaly Detection and Localization with Reduced Delay and False Alarm Rate
Competitive Advantages Monitors and analyzes large data sets Accurate detection of irregularities Minimized average detection delay Summary We have developed a technique called Online Discrepancy Test (ODIT) for real-time detection of anomalies in high-dimensional systems. This algorithm is generic and applicable to various contexts...
Published: 7/11/2023   |   Inventor(s): Mahsa Mozaffari, Keval Doshi, Yasin Yilmaz
Keywords(s): Cybersecurity, Data Mining, Database Management, Datasets, Diagnostic Tools for Network Vulnerability Evaluations
Category(s): Technology Classifications > Computer Science, Technology Classifications > Computer Science > C/S Cybersecurity, Technology Classifications > Data/AI > Cybersecurity - Data/AI, Technology Classifications > Computer Science > Datasets